Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Recent questions tagged ugcnetcse-june2016-paper2
4
votes
1
answer
31
UGC NET CSE | June 2016 | Part 2 | Question: 18
In a relational database model, NULL values canbe used for all but which one of the following? To allow duplicate tuples in the table by filling the primary key column(s) with NULL To avoid confusion with actual legitimate data ... is unknown To fill a column in a tuple when that column does not really "exist" for that particular tuple
In a relational database model, NULL values canbe used for all but which one of the following?To allow duplicate tuples in the table by filling the primary key column(s) ...
go_editor
4.8k
views
go_editor
asked
Aug 14, 2016
Databases
ugcnetcse-june2016-paper2
rdbms
sql
databases
+
–
4
votes
2
answers
32
UGC NET CSE | June 2016 | Part 2 | Question: 17
Which of the following statement(s) is/are FALSE in the context of Relational DBMS? Views in a database system are important because they with access control by aloowing users to see only a particular subset of the data in the databse E-R diagrams are ... SQL is a procedural language I and IV only III and IV only I, II and III only II, III and IV only
Which of the following statement(s) is/are FALSE in the context of Relational DBMS?Views in a database system are important because they with access control by aloowing u...
go_editor
4.9k
views
go_editor
asked
Aug 14, 2016
Databases
ugcnetcse-june2016-paper2
databases
+
–
4
votes
1
answer
33
UGC NET CSE | June 2016 | Part 2 | Question: 16
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: Referential integrity Multi-valued dependency Entity integrity Functional dependency
In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as:Referential integrityMulti-valued dependencyEntity integrityFunctional dependency
go_editor
2.6k
views
go_editor
asked
Aug 14, 2016
Databases
ugcnetcse-june2016-paper2
databases
rdbms
sql
+
–
3
votes
1
answer
34
UGC NET CSE | June 2016 | Part 2 | Question: 15
What is the value returned by the function f given below when n=100? let f(int n) { if (n==0) then return n; else return n+f(n-2); } 2550 2556 5220 5520
What is the value returned by the function f given below when n=100?let f(int n) { if (n==0) then return n; else return n+f(n-2); }2550255652205520
go_editor
3.4k
views
go_editor
asked
Aug 14, 2016
Programming in C
ugcnetcse-june2016-paper2
programming
+
–
4
votes
2
answers
35
UGC NET CSE | June 2016 | Part 2 | Question: 14
When a method in subclass has the same name and type signatures as a method in the superclass, then the method in the subclass ____ the method in the superclass. Overloads Friendhips Inherits Overrides
When a method in subclass has the same name and type signatures as a method in the superclass, then the method in the subclass ____ the method in the superclass.Overloads...
go_editor
1.8k
views
go_editor
asked
Aug 14, 2016
Object Oriented Programming
ugcnetcse-june2016-paper2
object-oriented-programming
+
–
3
votes
3
answers
36
UGC NET CSE | June 2016 | Part 2 | Question: 9
The simplified form of the Boolean equation $(A\bar{B}+A\bar{B}+AC)(\bar{A}\bar{C}+\bar{B})$ is $A\bar{B}$ $A\bar{B}C$ $\bar{A}B$ $ABC$
The simplified form of the Boolean equation $(A\bar{B}+A\bar{B}+AC)(\bar{A}\bar{C}+\bar{B})$ is$A\bar{B}$$A\bar{B}C$$\bar{A}B$$ABC$
go_editor
4.4k
views
go_editor
asked
Aug 14, 2016
Digital Logic
ugcnetcse-june2016-paper2
digital-logic
boolean-algebra
+
–
4
votes
2
answers
37
UGC NET CSE | June 2016 | Part 2 | Question: 8
Simplified Boolean equation for the following truth table is : ... $F=x \bar{y}+\bar{x}y$ $F=\bar{x}z+x\bar{z}$ $F=\bar{x}z+x\bar{z}+xyz$
Simplified Boolean equation for the following truth table is :$\begin{array}{|c|c|c|c|}\hline x & y & z & F \\ \hline \text{0} & \text{0} & \text{0} & \text{0} \\ \hlin...
go_editor
2.3k
views
go_editor
asked
Aug 14, 2016
Digital Logic
ugcnetcse-june2016-paper2
digital-logic
+
–
4
votes
2
answers
38
UGC NET CSE | June 2016 | Part 2 | Question: 11
Given i=0, j=1, k=-1, x=0.5, y=0.0, what is the output of the following expression in C language? x*y<i+j $\mid \mid$k -1 0 1 2
Given i=0, j=1, k=-1, x=0.5, y=0.0, what is the output of the following expression in C language?x*y<i+j $\mid \mid$k-1012
go_editor
3.8k
views
go_editor
asked
Aug 14, 2016
Programming in C
ugcnetcse-june2016-paper2
programming-in-c
+
–
3
votes
4
answers
39
UGC NET CSE | June 2016 | Part 2 | Question: 6
Which of the following logic expression is incorrect ? $1 \oplus 0 =1$ $1 \oplus 1 \oplus 1=1$ $1 \oplus 1 \oplus 0=1$ $1 \oplus 1 =0$
Which of the following logic expression is incorrect ?$1 \oplus 0 =1$$1 \oplus 1 \oplus 1=1$$1 \oplus 1 \oplus 0=1$$1 \oplus 1 =0$
go_editor
4.3k
views
go_editor
asked
Aug 14, 2016
Digital Logic
ugcnetcse-june2016-paper2
digital-logic
+
–
7
votes
1
answer
40
UGC NET CSE | June 2016 | Part 2 | Question: 5
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in a graph shown below? 2 4 5 6
A clique in a simple undirected graph is a complete subgraph that is not contained in any larger complete subgraph. How many cliques are there in a graph shown below?2456...
go_editor
5.4k
views
go_editor
asked
Aug 14, 2016
DS
ugcnetcse-june2016-paper2
data-structures
graph-theory
+
–
6
votes
2
answers
41
UGC NET CSE | June 2016 | Part 2 | Question: 4
There are three cards in a box. Both sides of one card are black, both sides of one card are red and the third card has one black side and one red side. We pick a card at random and observe only one side. What is the probability that the opposite side is the same colour as the one side we observed? 3/4 2/3 1/2 1/3
There are three cards in a box. Both sides of one card are black, both sides of one card are red and the third card has one black side and one red side. We pick a card at...
go_editor
2.8k
views
go_editor
asked
Aug 14, 2016
Probability
ugcnetcse-june2016-paper2
engineering-mathematics
probability
+
–
4
votes
1
answer
42
UGC NET CSE | June 2016 | Part 2 | Question: 13
Which one of the following is correct, when a class grants friend status to another class? The member functions of the class generating friendship can access teh members of the friend class All member functions of the class ... the members of the class granting the friendship Class friendship is reciprocal to each other There is no such concept
Which one of the following is correct, when a class grants friend status to another class?The member functions of the class generating friendship can access teh members o...
go_editor
5.3k
views
go_editor
asked
Aug 14, 2016
Object Oriented Programming
ugcnetcse-june2016-paper2
object-oriented-programming
friend-class
+
–
3
votes
2
answers
43
UGC NET CSE | June 2016 | Part 2 | Question: 2
The number of different spanning trees in complete graph, $K_4$ and bipartite graph, $K_{2,2}$ have ____ and ___ respectively. 14, 14 16, 14 16, 4 14, 4
The number of different spanning trees in complete graph, $K_4$ and bipartite graph, $K_{2,2}$ have ____ and ___ respectively.14, 1416, 1416, 414, 4
go_editor
5.5k
views
go_editor
asked
Aug 14, 2016
DS
ugcnetcse-june2016-paper2
data-structures
graph-theory
+
–
4
votes
2
answers
44
UGC NET CSE | June 2016 | Part 2 | Question: 1
How many difference equivalence relations with exactly three different equivalence classes are there on a set with five elements? 10 15 25 30
How many difference equivalence relations with exactly three different equivalence classes are there on a set with five elements?10152530
go_editor
3.8k
views
go_editor
asked
Aug 14, 2016
Set Theory & Algebra
ugcnetcse-june2016-paper2
discrete-mathematics
set-theory&algebra
+
–
7
votes
2
answers
45
UGC NET CSE | June 2016 | Part 2 | Question: 46
An attacker sits between customer and banker and captures the information from the customer and retransmits to the banker by altering the information . This attack is called as Masquerade attack Replay attack Passive attack Denial of service attack
An attacker sits between customer and banker and captures the information from the customer and retransmits to the banker by altering the information . This attack is c...
Sanjay Sharma
3.5k
views
Sanjay Sharma
asked
Jul 15, 2016
Computer Networks
ugcnetcse-june2016-paper2
computer-networks
network-security
+
–
4
votes
1
answer
46
UGC NET CSE | June 2016 | Part 2 | Question: 3
Suppose that $R_1$ and $R_2$ are reflecive relations on a set A. Which of the following statements is correct? $R_1 \cap R_2$ is reflexive and $R_1 \cup R_2$ is irreflexive $R_1 \cap R_2$ is irreflexive and $R_1 \cup R_2$ is reflexive Both $R_1 \cap R_2$ and $R_1 \cup R_2$ are reflexive Both $R_1 \cap R_2$ and $R_1 \cup R_2$ are irreflexive
Suppose that $R_1$ and $R_2$ are reflecive relations on a set A. Which of the following statements is correct?$R_1 \cap R_2$ is reflexive and $R_1 \cup R_2$ is irreflexiv...
Sanjay Sharma
2.6k
views
Sanjay Sharma
asked
Jul 11, 2016
Set Theory & Algebra
ugcnetcse-june2016-paper2
discrete-mathematics
relations
+
–
5
votes
3
answers
47
UGC NET CSE | June 2016 | Part 2 | Question: 21
Consider the following binary search tree: If we remove the root node which of the node from the left subtree will be the new root? 11 12 13 16
Consider the following binary search tree:If we remove the root node which of the node from the left subtree will be the new root?11121316
Sanjay Sharma
7.6k
views
Sanjay Sharma
asked
Jul 10, 2016
DS
data-structures
binary-tree
binary-search-tree
ugcnetcse-june2016-paper2
+
–
4
votes
2
answers
48
UGC NET CSE | June 2016 | Part 2 | Question: 7
The $\text{IEEE-754}$ double precision format to represent floating point numbers, has a length of ______ bits. $16$ $32$ $48$ $64$
The $\text{IEEE-754}$ double precision format to represent floating point numbers, has a length of ______ bits.$16$$32$$48$$64$
Sanjay Sharma
2.5k
views
Sanjay Sharma
asked
Jul 10, 2016
Digital Logic
ugcnetcse-june2016-paper2
digital-logic
ieee-representation
+
–
6
votes
1
answer
49
UGC NET CSE | June 2016 | Part 2 | Question: 10
In a positive edge triggered $J$-$K$ flip flop , if $J$ and $K$ both are high then the output will be ______on the rising edge of the clock : No change Set Reset Toggle
In a positive edge triggered $J$-$K$ flip flop , if $J$ and $K$ both are high then the output will be ______on the rising edge of the clock :No changeSetResetToggle
Sanjay Sharma
4.1k
views
Sanjay Sharma
asked
Jul 10, 2016
Digital Logic
ugcnetcse-june2016-paper2
digital-logic
flip-flop
+
–
4
votes
2
answers
50
UGC NET CSE | June 2016 | Part 2 | Question: 12
The following statement in C : int (*f())[ ]; declares a function returning a pointer to an array of integers a function returning an array of pointers to integers array of functions returning pointers to integers an illegal statement
The following statement in C : int (*f())[ ]; declaresa function returning a pointer to an array of integersa function returning an array of pointers to integersarray of ...
Sanjay Sharma
4.9k
views
Sanjay Sharma
asked
Jul 10, 2016
Programming in C
ugcnetcse-june2016-paper2
programming-in-c
+
–
Page:
« prev
1
2
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register